Cybersecurity: Crash Course Computer Science #31

Поділитися
Вставка
  • Опубліковано 1 гру 2024

КОМЕНТАРІ • 467

  • @photophone5574
    @photophone5574 5 років тому +352

    1:50 “that shows who your enemy is.” *shows a little girl on her computer*
    A formidable foe.

    • @sudocatsda1guy390
      @sudocatsda1guy390 5 років тому +16

      She stole a bunch of info about me I'm not proud of and some disgusting info I am proud of.

  • @RaymondHng
    @RaymondHng 7 років тому +1049

    Please enter your new password:
    "cabbage"
    Sorry, the password must be more than 8 characters.
    "boiled cabbage"
    Sorry, the password must contain 1 numerical character.
    "1 boiled cabbage"
    Sorry, the password cannot have blank spaces.
    "50bloodyboiledcabbages"
    Sorry, the password must contain at least one upper case character.
    "50BLOODYboiledcabbages"
    Sorry, the password cannot use more than one upper case character consecutively.
    "50BloodyBoiledCabbagesShovedUpYourArse,IfYouDon'tGiveMeAccessnow”
    Sorry, the password cannot contain punctuation.
    “ReallyPissedOff50BloodyBoiledCabbagesShovedUpYourArseIfYouDontGiveMeAccessnow”
    Sorry, that password is already in use.

    • @the80386
      @the80386 7 років тому +40

      thanks. been a while since I had a belly cramp laughing.

    • @angeljesus9674
      @angeljesus9674 6 років тому +23

      Thanks for making me read all that 😂

    • @metanumia
      @metanumia 6 років тому +13

      That was hilarious!

    • @enriquemartinez8915
      @enriquemartinez8915 6 років тому +8

      LMAO 🤣 crying😂😂😂😂😂😂🤣😅

    • @destinyfoley8827
      @destinyfoley8827 6 років тому +3

      RaymondHng that is everything

  • @amur_
    @amur_ 7 років тому +328

    I learned the same things in a 8 hour online course. Truly a Crash Course

  • @JCorvinusVR
    @JCorvinusVR 7 років тому +611

    Remember to change your face every 90 days to prevent hackers from getting into your account.

    • @oldcowbb
      @oldcowbb 7 років тому +46

      my face already include at least one symbol, at least one upper case letter and at least one number

    • @khizerjamal6484
      @khizerjamal6484 6 років тому +11

      Meanwhile in a plastic surgeon...

    • @KelNg130
      @KelNg130 4 роки тому +2

      That's only if you used facial recognition (which is biometric) as the authentication mechanism. Just simply use long passwords.

  • @stevieinselby
    @stevieinselby 7 років тому +35

    One thing I would like to see stressed is that two-factor authentication has to ask for two *different types* of authentication. Asking for a password _and_ a PIN is still only one-factor, because they are both things that you have remembered (or written down), so if someone has got hold of your password file they can enter one, two or twenty passwords correctly - asking for more than one doesn't stop them. This was something that online banking got very wrong for quite some time, although most banks seem to have got it sorted out now.

  • @marcbellucci2469
    @marcbellucci2469 5 років тому +40

    You're killing me with the "I'd take it ALL" ATM comment. I'm sitting here dying!

  • @AnonymousFreakYT
    @AnonymousFreakYT 7 років тому +153

    As a "cybersecurity"† professional, this is an excellent episode. Well written, well delivered. Just the right amount of detail for a "class," while not being so over-simplified to be actually wrong. (I see that too often, newspaper articles, TV news segments that oversimplify to the point that what they say is wrong, not just "simplified.")
    †I freaking *HATE* the word/prefix "cyber".

    • @seededsoul
      @seededsoul 7 років тому +3

      Anonymous Freak Yes, it sounds cheesy, and used to refer to something else...

    • @wachirarisky4284
      @wachirarisky4284 5 років тому +8

      How did you get your first job and what do you recommend learning for Cyber security

  • @zacharyedmond8223
    @zacharyedmond8223 7 місяців тому +2

    i work as a senior cybersec engineer in incident response and threat intelligence. love it!

  • @RichIrving
    @RichIrving 7 років тому +31

    This is a great video. Explains the topic enough so that non-technical people understand the threats and how to mitigate them. Great job!

  • @davemonkey26
    @davemonkey26 7 років тому +1375

    This video is bologna, if people don't click on random links in their emails, how will I ever give away my millions?

    • @Riktamorty
      @Riktamorty 7 років тому +11

      Lololol

    • @merlinthelemurian3197
      @merlinthelemurian3197 7 років тому +32

      I laughed way more than I should have

    • @gabrielagbese1945
      @gabrielagbese1945 7 років тому +3

      dude thats racist

    • @davemonkey26
      @davemonkey26 7 років тому +152

      Seeing as this account is a satirical parody of the Nigerian prince email spams, it is not racist as it is just a reference to an actual occurrence.
      Even so, if there was no such thing as the Nigerian Prince email spam (which there still very much is lmao) the only adjective this account title uses is Nigerian, which describes ones place of origin or citizenship. If anything this account is nationalist, not racist.
      In conclusion, you have incorrectly analyzed the process and purpose I use to deliver humor in my comments and will not be receiving my horded millions of dollars.

    • @kyledolor5257
      @kyledolor5257 7 років тому +45

      Gabriel Agbese you got rekt dude

  • @scooter3387
    @scooter3387 2 роки тому +15

    Using this to prep myself for a Master's in Cybersecurity. This broke down everything way better than most of the material I have read.

  • @MuhammadAhmed-wh5kv
    @MuhammadAhmed-wh5kv 5 років тому +15

    Just love going back from time to time to watch some of this amazing course episodes!

  • @TheSYLOH
    @TheSYLOH 7 років тому +159

    Fun fact: At 55,000 views there's a 99.59% chance she guessed someone's pin.
    Assuming that people PINs are evenly and randomly distributed.
    1 - (9999/10000)^55000

    • @Elizabethbaileysigmar
      @Elizabethbaileysigmar 5 років тому +1

      I love math.

    • @juanaseok6537
      @juanaseok6537 5 років тому

      Nice one XD

    • @randomperson3195
      @randomperson3195 5 років тому +5

      And assuming everyone has viewed it only once.

    • @frankding7584
      @frankding7584 4 роки тому +3

      The thing is though, 2580 is a straight line down the keypad and we all know everyone hates straight lines

  • @justin213
    @justin213 2 роки тому +5

    Going into Cybersecurity and this is so cool

  • @id01_01
    @id01_01 6 років тому +12

    Password requirements aren't more secure in practice - consider the two following passwords: "Passw0rd!" or "da-ba-dee-ba-doo". The second is much more secure, as the only feasible way to guess the password is brute force with letters and symbols, and most likely numbers too, but doesn't have digits nor capital letters. The first can be cracked using a dictionary attack with mutation.

  • @KeithMakank3
    @KeithMakank3 5 років тому +17

    I work in security and I approve this message. Excellent video!

  • @marielleforgotmylastname8282
    @marielleforgotmylastname8282 7 років тому +9

    Spot on with everything. I really enjoy the series! I have a pretty decent amount of experience with IT stuff, but I still manage to learn at least one new bit of info with every video. :D

  • @Uejji
    @Uejji 7 років тому +23

    That's amazing! I've got the same combination on my luggage!

    • @microbuilder
      @microbuilder 7 років тому +1

      May the Schwartz be with you.

  • @toxicslushpuppy
    @toxicslushpuppy 4 роки тому +20

    It is a guilty pleasure every time Carrieanne says "doobalidoo".

  • @ill6ixx538
    @ill6ixx538 5 років тому +46

    Carrie Anne keep it real. No access to ATMs or she'll take all of it xD

    • @watchit387
      @watchit387 4 роки тому +3

      that ceramic cat collection doesn't buy itself XD

  • @peterschubert3429
    @peterschubert3429 7 років тому +41

    I wonder why nobody in these videos ever mentions the possibility to use words from different laguages. It increases the possible combinations even more! :D

    • @amandal.1422
      @amandal.1422 6 років тому +6

      I do that all the time, I really stopped using English anymore lmao

    • @Elizabethbaileysigmar
      @Elizabethbaileysigmar 5 років тому

      I was going to make a comment about password length vs diversity of characters. Rainbow tables let me crack anything less than 14 characters really easy but anything more gets weird.
      One method I used to use was take a Chinese word, change the diphthongs to produce many different words and then string them all together in English. Easy for me to remember but really hard for a computer to guess.
      Like house horse mother. You go over the rainbow tables. Yep go look it up. It does not require a bunch of hard to remember special characters and numbers.
      One of my fun games at work is just repeating the same thing in as many languages as I can think of at the time. But sequential translations get weird.
      My favorite pattern is English, Spanish, German. Add slang and it gets weird really fast
      Long list, English, Spanish, (Taino if Puerto Rican), Portuguese, French, Romanian [short story later], German, Swedish, Dutch, Arabic (Burbur if they are Moroccan, like Ara means give me in Arabic but write or sign your name in Burbur), Uzbeki, Turkish, then Russian and then Polish.
      It makes sense in my head, don't judge me. I was telling a joke to a Puerto Rican woman last year and she stopped me in the intro telling me she knew Taino and knew what the word meant. It was a play on words. The only time that joke has failed me.
      Two points on Romanian. The first was a woman on her phone who just could not be bothered to get of her phone. So I said something to her in Russian.
      She was like why are you talking to me in Russian, and I was like because you are not paying attention to me in English and my Romanian is poor.
      The second was a Romanian women who would not get off her phone. So I got annoyed and started talking to her mother who was born in Romania.
      The mother then spent the next two minutes berating her daughter for not knowing how to pronounce words correctly in Romanian.
      Jewish mothers...

    • @freshprinceofnightcity
      @freshprinceofnightcity 4 роки тому

      I will try that method.

  • @rswhite
    @rswhite 6 років тому +6

    1, 2, 3, 4, 5? That's amazing! I've got the same combination on my luggage!

  • @jonnysokkoatduckdotcom
    @jonnysokkoatduckdotcom Рік тому +1

    A 12 minute long course this really is a crash course!

  • @_productivity__nill_1131
    @_productivity__nill_1131 6 років тому +21

    Confidentiality - data that only authorised people can read
    Integrity - data that only authorised people can modify
    Availability - data which authorised people should have access to

    • @KelNg130
      @KelNg130 4 роки тому +2

      Almost. The last one is simply Authorization. Availability refers to the "ability to access data when we need it".
      The Parkerian hexad, although considered to be a more complete model, is not widely known as the CIA triad. It consists of: Confidentiality, Integrity, Availability, Possession, Authenticity, and Utility.
      Possession - physical dispostion of media on which data is stored in.
      Authenticity - data that can be properly attributed to the owner/creator.
      Utility - data that is useful depending on content and format.

  • @AmyJayOnTheWay
    @AmyJayOnTheWay 7 років тому +199

    I appreciate these videos so much! I've learned enough to know that I want to learn more -- and I'm hoping to get Security+ certified next year!

    • @ravik694
      @ravik694 7 років тому +4

      Amy Jay good luck, Amy! Security+ was my first certification and it's a great starting point.

    • @arobiteme
      @arobiteme 7 років тому +6

      Some military jobs make us get the very in only 9 days of education with no experience. Often we have to test a couple times, but it's doable. The 501 version is gunna be killer though, so study up!

    • @musashi939
      @musashi939 7 років тому +7

      Briana Pierce haha. That sounds like learn to code in one weekend. Why even bother to study software engineering if you can learn that in one weekend or becoming a security consultant in 9 days. You gotta be kidding me.

    • @XoXitsSaruhh
      @XoXitsSaruhh 7 років тому +1

      I'm doin dat! I'm also getting Net+ and I already have my A+

    • @arobiteme
      @arobiteme 7 років тому +4

      Well, we manage to successfully do our jobs. Don't get me wrong, some people never make it through. But if you find the time we get amusing, you should realize that we take the exact same test as you, getthe exact same cert, and do our jobs effectively.

  • @leogomez4u
    @leogomez4u 7 років тому +8

    Thanks for making these videos.I'm on my way to becoming a+ certified and cross reference a lot of the things you illustrate

    • @Shackleford_Rusty
      @Shackleford_Rusty 7 років тому +1

      leogomez4u skip it, read the books get hands on, grab your network+, ccna, security +, even an MCSA. A + knowledge is great but the cert isn’t worth the money.

    • @21guitarworld
      @21guitarworld 6 років тому

      Don't listen to them, A+ is your concrete to your house, network+, and Sec+, and etc are the walls and the roofs.

    • @YoungDen
      @YoungDen 6 років тому +1

      Actually Net+ is your concrete, walls and roof with Windows and doors while Security+ is your fence. The more experience with Security+ the higher the fence. A+ would be more like building the shed in the back. Nice to have but not important enough to live in or off (the cert).

  • @bradyryden1841
    @bradyryden1841 7 років тому +2

    FINALLY!!!! The reason why I watch this!

  • @cefalves
    @cefalves 7 років тому +2

    I AM brazillian and I love yours vídeos. Thank you.

  • @mariniikk
    @mariniikk 7 років тому +4

    I'm interested in psychology, tech, and bio. Y not combine the three and go into comp systems to research the "brain" and artificial intelligence of computers?! That's how I got here :). I've recently discovered the (huge and overwhelming) world of cyber tech but as a Russian speaking blond 5' girl, I think it would be cool to get a job in this field. I'm 14 and new to this but it's super interesting and these vids help

  • @mitwhitgaming7722
    @mitwhitgaming7722 7 років тому +198

    Is that a Spy Kids _and_ a Ben 10 reference in the thubnail!? Respect.

    • @jepersprepur2809
      @jepersprepur2809 7 років тому +7

      _Mit_Whit _Gaming_ though it’s a really weird one because ones from the most disliked 3rd film Spy Kids 3d and the other is from Omniverse

    • @mitwhitgaming7722
      @mitwhitgaming7722 7 років тому +3

      Jepersprepur IKR?! 😂

    • @jepersprepur2809
      @jepersprepur2809 7 років тому +1

      _Mit_Whit _Gaming_ mmmhmmm

    • @JM-us3fr
      @JM-us3fr 7 років тому

      Now I'm sad I didn't get the Ben 10 reference

    • @FireBugRBLX
      @FireBugRBLX 7 років тому +5

      _Mit_Whit _Gaming_ The actual name of the black and red humanoid in 9:18 is actually "Malware", a villain from Ben 10: Omniverse, they might have used the character since Malware is a best symbol for the error

  • @WoWDart
    @WoWDart 7 років тому +3

    I love this series. Thank you for all your hard work.

  • @miguellima737
    @miguellima737 Рік тому +3

    very noice video

  • @Slayer_Jesse
    @Slayer_Jesse 7 років тому +25

    Correct Horse Battery Staple

    • @remuladgryta
      @remuladgryta 7 років тому +2

      Hunter2

    • @burnedexperiment
      @burnedexperiment 7 років тому +6

      "Lil' Bobby tables we call him...i hope you learned to sanitize your database inputs."

    • @wolvenmoonstone8138
      @wolvenmoonstone8138 7 років тому +3

      funny, go change your password now

    • @Orinslayer
      @Orinslayer 7 років тому

      That's actually a bad password.

  • @beyond12021
    @beyond12021 4 роки тому +3

    "Cyber Security is like the Jedi Order trying to bring Peace and Justice to the Cyberverse" *Decides to go back to school and study Cyber Security*

  • @richardoder9171
    @richardoder9171 6 років тому +1

    I receive so many call indicating "I'm with your computer security and your computer has been compromised, I am looking at your computer security systems and we need to fix it right away" I call BS and almost always the line goes dead. Can even the companies that are legitimate see into your computer without your knowledge?

  • @wolvenmoonstone8138
    @wolvenmoonstone8138 7 років тому +2

    I would like to make a subtle yet important distinction
    ALLOWING the option to use 9 or more capital and lowercase adding symbols spaces and numbers makes the number of possible passwords increase and is therefore more sucure
    REQUIRING a password to contain those things to be valid lowers the number making passwords less sucure harder to remember and more annoying to create and encourages users to have the same password for multiple accounts (don't do that)

  • @Theorak
    @Theorak 7 років тому +6

    Open source for security is a topic that came up for our (Germany) election software, because the old one was hidden and faulty, could be a right step imo.

    • @armorsmith43
      @armorsmith43 7 років тому +1

      Alternately (though I don't know how well this works in a federal system with different layers of elections), just use pencil and paper for voting like the Brits do.

    • @tuele4302
      @tuele4302 7 років тому +1

      Pen is better in this case since pencil writing can be erased.

    • @Cryssball
      @Cryssball 7 років тому +1

      if the topic is security... how is pen and paper more secure than Open source?

    • @tuele4302
      @tuele4302 7 років тому

      I was comparing pen to pencil.

    • @Cryssball
      @Cryssball 7 років тому

      my bad. I should had clarified I was refering to Andrew Farrell

  • @armorsmith43
    @armorsmith43 7 років тому +10

    If you ever see a system either show you your password or say you can't have a password longer than 16 characters, you know that site isn't storing your password securely.
    If you are implementing a system to check a user's password it is important not to store the password itself but instead when the user sets their password:
    1) Generate a random string and stick it at the end of the password (called a 'salt')
    2) Run the password+salt through a 1-way hash function like bcrypt
    3) Store both the salt and the hashed+salted password in your database.
    Then, when your user goes to log in, read the salt from the database, add it to the login, run it through bcrypt and check if it matches the hashed+salted password.

    • @remuladgryta
      @remuladgryta 7 років тому +3

      Even better, rely on someone else who knows what they are doing to do it for you. Even the experts get this stuff wrong from time to time and you're not an expert. Use a well known, heavily tested and actively updated library for anything security related. If you're doing anything other than something like library.storepassword(username, password) and library.startsession(username, password), you're probably doing something wrong.

    • @armorsmith43
      @armorsmith43 7 років тому +1

      Exactly right, though you'll need to know how things work at the layer of abstraction I described to know what to look for in a library.
      Don't roll crypto yourself except for fun & practice.

    • @JimCullen
      @JimCullen 7 років тому +1

      >or say you can't have a password longer than 16 characters
      Some companies do this for customer support reasons. They do a check on the string they're sent _prior_ to running the hash on it, so it can still be done securely. But longer passwords are more likely to be forgotten, so some large organisations might choose to restrict password length to reduce the burden on their customer support lines.
      If they can send you your password upon request though. Yeah, that's completely indefensible. They _might_ be able to email you your password immediately after you first set it (although that is a terrible idea because email is a terribly insecure protocol) without compromising database security, but at any other point they should not have access to your plaintext password.

    • @armorsmith43
      @armorsmith43 7 років тому +1

      @Jim Cullen you're right. Its a signal that they're storing the password, but not actually a guaruntee.
      But really what they should do to accomplish their goal is actively suggest passphrases. But people are often silly.

    • @JimCullen
      @JimCullen 7 років тому

      I wish more companies would encourage using password managers. Passphrases are okay, but they're no where near as good as an equally long pseudo-random password. And if they form sensible sentence structures (as opposed to being completely randomly chosen words), passphrases are even worse.
      Using good 2FA (*not* SMS-based 2FA) on more sites would also be nice.

  • @sparksparkboom
    @sparksparkboom 7 років тому +2

    I'm majoring in this starting next year!!!

  • @user-nj1qc7uc9c
    @user-nj1qc7uc9c 6 років тому +2

    4:08 you have to remember, it doesn't just have to generate those numbers, it also has to enter them in, for example even python, a really freaking slow language, can count from 0 to 10000 in 0.0009965896606445312 seconds, pretty freaking fast! But if you want python to print each individual number, it will take about 4.403296709060669 seconds, although entering the numbers might not take as long as printing each one, it would still take at least a second

  • @blacksatoshi6486
    @blacksatoshi6486 5 років тому

    i LOVE CARRIE ANN HER REFERENCES ARE SO COOL FROM GAMING TO PETS TO MOVIES EVERYTHING!!!!!!!!!!!!!!

  • @TGC40401
    @TGC40401 7 років тому +3

    2:24 Oh, that's what _safe mode_ means

  • @peterstiles1
    @peterstiles1 7 років тому

    This series is so great I can even forgive Carrie-Anne's, 'tongue down the back of Green Bros. trousers' comment at 5:19.

  • @jess_tech
    @jess_tech 7 років тому +2

    This video is incredible! Thank you so much!

  • @ismailkucuk1684
    @ismailkucuk1684 6 років тому

    Hi, I appreciate you. I needed the information you gave as a seo and digital marketing specialist. I did not come across a channel or person who described terms like Internet, TCIP as simple as you. Thanks again...

  • @2012Zyle
    @2012Zyle 7 років тому +44

    Who's PIN was 2580?

    • @lucasfarinhabosio6306
      @lucasfarinhabosio6306 7 років тому +18

      Not me. Nope. Certainly not.

    • @microbuilder
      @microbuilder 7 років тому +29

      12345?? Thats amazing, I've got the same combination on my luggage!!!

    • @TheOlian04
      @TheOlian04 7 років тому +2

      microbuilder spaceballs ;)

    • @microbuilder
      @microbuilder 7 років тому +1

      of course...I think any time a combination is mentioned, all SB fans ears perk up lol

    • @LMAccount1
      @LMAccount1 7 років тому +3

      Some idoit on the internet that’s such a coincidence, mine was too! What platform were you using?
      -Jimmy Nottahakker

  • @JosephSantoro
    @JosephSantoro 7 років тому +2

    I was wondering how you would do this in one short video... Not bad!

  • @Mostlyharmless1985
    @Mostlyharmless1985 7 років тому

    I’m seriously hoping we go over airgaps and compartmentalization, because they are the true implementation of write up, read down. You gave a very dangerous idea that privileged information can be held on a system that processes unprivileged information. What you should do is keep them all in different systems that are physically separate from each other. The only way you can send information from a less privileged system to a higher level is to cross a physical air gap between machines.
    Compartmentalization is just a fancy way to say keeping information available to those that need to know it. A CFO would certainly need access to a businesses finance information, but even if he has a high level of access, there is no reason that he should have access to the R and D information.
    Still an admirable job for something so broad as “security” you boiled down several months of training into less than 15 minutes. You get my “eh close enough” seal of approval!

  • @kofiacquah6972
    @kofiacquah6972 4 роки тому

    I love her enthusiasm

  • @DuluthTW
    @DuluthTW 7 років тому +6

    My new password is Ceramic_cat_figurines. Ooops, maybe not. Another great episode. Thanks!

  • @idtyu
    @idtyu 7 років тому +5

    The biggest flaw of a security system is human, and hackers always compromise humans first because humans are the most vulnerable

    • @KelNg130
      @KelNg130 4 роки тому

      In the context of cybersecurity, this is known as the human factor. Human element will always be the weak link in security (e.g. social engineering).

  • @IceMetalPunk
    @IceMetalPunk 7 років тому +1

    Important note: chip-and-PIN credit cards are a now-ubiquitous example of two-factor authentication! It verifies what you have (the card with the chip) and what you know (your PIN).
    Of course, most chip-and-PIN readers will, if they fail to properly read the chip, revert back to letting you swipe the card again and using it without the chip. And that's a problem: if someone can copy the magnetic stripe on your card, say with a skimmer, then they can easily create a chip-and-PIN card with an intentionally damaged chip, letting them spoof your card and thus remove the "what you have" authentication step. Instant vulnerability.
    Luckily, it's basically impossible to copy your magnetic stripe if you never swipe your card, so using the chip all the time can prevent such an attack from happening. On the other hand, at least at my job, the card readers fail to read chips properly about 25% of the time, and that means quite a lot of people still end up swiping their card. If these readers are representative of the majority of readers in the world, then that is a serious flaw in the system that needs to be fixed.

  • @artofthehak5508
    @artofthehak5508 6 років тому +2

    This is a great video, it's more difficult to do these animated vids than to just have a talking head spitting a script. Nice job guys

  • @Nova93Perez
    @Nova93Perez 7 років тому +3

    I wish the schools around me make this a BS major. But they're only MA thus far. I'm going to try the MA program.

    • @seededsoul
      @seededsoul 7 років тому

      xBroken_Truths Travel to a good school. You only establish yourself as an adult(go to college) once, make it count.

  • @jackf5821
    @jackf5821 7 років тому +1

    I've been studying computer science for 3 years now and i was always interested in the security aspect of it but there is something that bothers me. When i ask for guidance ( both on the internet and in real life ) people happily point me to proper learning material except when ask things related to security, for example if say something like "I want to learn graphics design." or "I'm interested in programming" i get "Sure, here's dozens of websites/courses/books..." but the moment i say "I want to write self-modifying software" or "I want to learn reverse engineering" people start acting like they saw a ghost and instead of helping me they go "Why do you want to learn that?". Even when i look for courses online they teach you how to use existing hacking/pentesting software and give examples of exploits that went obsolete 10 years ago and have nothing to do with current systems. That's not what i want, i want to learn how those tools operate under the hood and be able write one from scratch if i want to. I want to see behind the curtain and manipulate whats happening below the user level.

    • @armanke13
      @armanke13 6 років тому +1

      Jack F, good luck..
      I think computer and human have different language. We can only understand in abstraction. Maybe you want to look into open source processor like RISC V.

  • @DragonRamer
    @DragonRamer 7 років тому +23

    Thanks so much, im only 13 and this interests me so much! I went to a cyber security competition a few weeks back and it was amazing! I placed 2nd place w/ only a little background knowledge that I learned from coding in various languages/reverse engineering a lot over the years! 🙂😀😀

    • @thijsvandaele4339
      @thijsvandaele4339 7 років тому +2

      Congrats! Follow your dream Dargon, Remember, The only thing you need is passion and curiosity!!!

    • @DragonRamer
      @DragonRamer 7 років тому +1

      Thijs Vandaele True!! Thank you.

    • @grantg117
      @grantg117 7 років тому

      You should post this kind of stuff on your UA-cam channel

    • @Wolf-sd8fr
      @Wolf-sd8fr 7 років тому +1

      Learn Kali Linux

    • @mikuhatsunegoshujin
      @mikuhatsunegoshujin 7 років тому

      Install gentoo hardened.

  • @tendies
    @tendies 7 років тому +1

    Please do a video about Block-chain!

  • @Beryllahawk
    @Beryllahawk 7 років тому

    Correct horse battery staple! Yay!

  • @victor.ruto.7919
    @victor.ruto.7919 6 років тому

    This gonna help a lot... Thanks a lot

  • @ChristopherMaines-o5e
    @ChristopherMaines-o5e 2 місяці тому

    I love technology!

  • @KBurchfiel
    @KBurchfiel 5 років тому +2

    7:04 and what if an attacker compromises your fingers? :o

  • @KiddsockTV
    @KiddsockTV 7 років тому +7

    awww man.. now I have to change my pin.

  • @joeholszter2633
    @joeholszter2633 5 років тому

    I love this video and I love that lady teaching it everything about this is good

  • @Rosi2001
    @Rosi2001 5 років тому

    0:18 Legendary bike Favorit.

  • @TGC40401
    @TGC40401 7 років тому

    I updated everything I have access to, after this video.

  • @midnightharvest3065
    @midnightharvest3065 4 роки тому

    As an IT major with a focus on Cybersecurity, this video is very informative and provides a good understanding of my career future

  • @frencheneesz
    @frencheneesz 7 років тому

    Good episode! Would be nice to hear an indictment of modern operating systems (especially windows) that were designed in pretty much the least secure way possible.

  • @historiasbiblicasvirais
    @historiasbiblicasvirais 24 дні тому

    Very nice video! Thanks

  • @MrKajithecat
    @MrKajithecat 6 років тому

    Enrolling into school for this next year.

  • @abdulrahmanalqarni2024
    @abdulrahmanalqarni2024 5 років тому

    Good topic explanation

  • @PavanPhaneendra423
    @PavanPhaneendra423 7 років тому +2

    Wow what a video

  • @PavanPhaneendra423
    @PavanPhaneendra423 7 років тому +2

    Good video

  • @chicksssyht
    @chicksssyht 6 років тому

    BIBA!! I appreciated that

  • @activecypher6589
    @activecypher6589 4 роки тому

    Great intro course.

  • @yassineelmalki4223
    @yassineelmalki4223 Рік тому

    Fantastic 🎉

  • @nathanpieper3859
    @nathanpieper3859 2 роки тому

    Which is better, changing a 8 digit pin to a 10 digit pin, or allowing letters and symbols in your 8 character long pin.

  • @radtack8457
    @radtack8457 7 років тому +63

    Anyone else notice Malware from Ben 10 Omniverse? XD

  • @tueemsyhu4846
    @tueemsyhu4846 6 років тому

    NOTHING IS TOTALLY SAFE!!GOOD VIDEO!!😀😊

  • @xyz-hx5dh
    @xyz-hx5dh 6 років тому

    Learned a lot thanks .

  • @guest_informant
    @guest_informant 7 років тому

    Only a couple of minutes in but isn't one of the biggest issues of cyberinsecurity rushed, or even panicked driven by greed and speed, implementation. Cyber security is a big issue because cyber *insecurity* is a big issue.

  • @evenana4399
    @evenana4399 6 років тому

    I JUST LEARNED HOW THIS CYBERSECURITY WORKS

  • @icouldbeoneofyou
    @icouldbeoneofyou 6 років тому +1

    Biometric's are not good authentication. not only can fingerprints, retina patterns, etc, be duplicated but computers only read 1's and 0's and the biometric readers are fairly simple in their conversion. It would be fairly simply to duplicate their output once the make and model of the reader is known....which is easily figured out if you can get the MAC address of the reader...

  • @michaeldzema4272
    @michaeldzema4272 6 років тому

    Awesome video !

  • @mincewatisimatupang2471
    @mincewatisimatupang2471 4 роки тому

    interesting you explain with direct with pictures ... i need lesson computer science

  • @dannyj391
    @dannyj391 7 років тому

    Love theese videos puts me right to sleep

  • @rparl
    @rparl 7 років тому +4

    Is the kid in the sandbox one of the Green brothers doing a cameo?

    • @AaronOrtiz
      @AaronOrtiz 7 років тому +1

      Ross Parlette: John, I think.

  • @mangdesign1593
    @mangdesign1593 5 років тому

    *Searches infosec crash course* to cram for exam, sees 7hr Google one or this one - real head-scratcher.

  • @geetbhardwaj3879
    @geetbhardwaj3879 5 років тому

    thanks. Very useful

  • @gailaltschwager7377
    @gailaltschwager7377 2 роки тому

    Thank you!

  • @skroot7975
    @skroot7975 7 років тому

    I'd love an episode on neural networks.

  • @mincewatisimatupang2471
    @mincewatisimatupang2471 4 роки тому

    i like your video because it is my lesson , please explain more with use pictures exemples direct ...it is my lesson

  • @rpsloss
    @rpsloss 5 років тому

    This was really well done. Thanks!

  • @philward2098
    @philward2098 5 років тому

    she's a Trekkie, likes Star Wars, and cats i think im in love

  • @gardenhead92
    @gardenhead92 7 років тому

    Would have been nice to go over capability-based security as an alternative to ACLs.

  • @ProWhitaker
    @ProWhitaker 7 років тому

    Thanks for the video

  • @kaifae
    @kaifae 7 років тому

    Why didn't you use the CISSP standard definitions for confidentiality, integrity, and availability? Integrity is less about the authorized person accessing the data, and more about the data itself being complete or whole.

  • @PJemus
    @PJemus 7 років тому +3

    Woah they got my exact pin. What are the chances?

    • @tylerpeterson4726
      @tylerpeterson4726 7 років тому +3

      PaJeezy Yeah. It was really weird to see my pin. I know I’m going to Bank of America next week. I just don’t have the time to go now.

    • @Mostlyharmless1985
      @Mostlyharmless1985 7 років тому +1

      About 1 in 10 thousand.

  • @qwertyman1511
    @qwertyman1511 7 років тому +1

    11:04
    Worst case, the malware is expecting to be sandboxed and finds a way to escape it.

    • @coows
      @coows 6 років тому

      Yeah.

  • @eloyruiz2855
    @eloyruiz2855 5 років тому

    I love your video thank you

  • @Scorpionwacom
    @Scorpionwacom 7 років тому +4

    1:51 “...Who your enemy is”-a Russian keyboard appears on screen.